TW200610349A - Key derivation functions to enhance security - Google Patents
Key derivation functions to enhance securityInfo
- Publication number
- TW200610349A TW200610349A TW094127150A TW94127150A TW200610349A TW 200610349 A TW200610349 A TW 200610349A TW 094127150 A TW094127150 A TW 094127150A TW 94127150 A TW94127150 A TW 94127150A TW 200610349 A TW200610349 A TW 200610349A
- Authority
- TW
- Taiwan
- Prior art keywords
- key
- key derivation
- enhance security
- derivation functions
- derived
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/918,718 US7577250B2 (en) | 2004-08-12 | 2004-08-12 | Key derivation functions to enhance security |
Publications (2)
Publication Number | Publication Date |
---|---|
TW200610349A true TW200610349A (en) | 2006-03-16 |
TWI406549B TWI406549B (zh) | 2013-08-21 |
Family
ID=35799983
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW094127150A TWI406549B (zh) | 2004-08-12 | 2005-08-10 | 用以增強安全性之金鑰導出函數 |
Country Status (2)
Country | Link |
---|---|
US (3) | US7577250B2 (zh) |
TW (1) | TWI406549B (zh) |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101375284B (zh) | 2004-10-25 | 2012-02-22 | 安全第一公司 | 安全数据分析方法和系统 |
JP2006304167A (ja) * | 2005-04-25 | 2006-11-02 | Sony Corp | キー生成方法およびキー生成装置 |
FR2887351A1 (fr) * | 2005-06-16 | 2006-12-22 | St Microelectronics Sa | Protection d'un calcul d'exponentiation modulaire effectue par un circuit integre |
DE102005030657B3 (de) * | 2005-06-30 | 2006-11-16 | Siemens Ag | Codierverfahren und Codiereinrichtung zum Sichern eines Zählerstands eines Zählwerks vor einer nachträglichen Manipulation, sowie Prüfverfahren und Prüfeinrichtung zum Prüfen einer Authentizität eines Zählerstands eines Zählwerks |
JP2007086170A (ja) * | 2005-09-20 | 2007-04-05 | Nec Corp | 汎用ハッシュ関数族計算装置、方法、プログラム、および共有鍵生成システム |
US8234505B2 (en) * | 2006-01-20 | 2012-07-31 | Seagate Technology Llc | Encryption key in a storage system |
US8285988B2 (en) | 2006-05-09 | 2012-10-09 | Broadcom Corporation | Method and system for command authentication to achieve a secure interface |
US8560829B2 (en) * | 2006-05-09 | 2013-10-15 | Broadcom Corporation | Method and system for command interface protection to achieve a secure interface |
US20070283158A1 (en) * | 2006-06-02 | 2007-12-06 | Microsoft Corporation Microsoft Patent Group | System and method for generating a forensic file |
KR101405321B1 (ko) | 2007-03-16 | 2014-06-27 | 재단법인서울대학교산학협력재단 | 키 연산 방법 및 이를 이용한 공유 키 생성 방법 |
JP5210376B2 (ja) * | 2007-05-07 | 2013-06-12 | ヒタチデータ・システムズ・コーポレイション | 固定コンテンツ分散型データ記憶システムにおけるデータ機密保持方法 |
FR2916871A1 (fr) * | 2007-06-01 | 2008-12-05 | France Telecom | Obtention de valeurs derivees dependant d'une valeur maitresse secrete. |
US8621210B2 (en) * | 2008-06-26 | 2013-12-31 | Microsoft Corporation | Ad-hoc trust establishment using visual verification |
US8931088B2 (en) | 2010-03-26 | 2015-01-06 | Alcatel Lucent | Adaptive distinct counting for network-traffic monitoring and other applications |
US8300831B2 (en) | 2010-04-26 | 2012-10-30 | International Business Machines Corporation | Redundant key server encryption environment |
US8644500B2 (en) * | 2010-08-20 | 2014-02-04 | Apple Inc. | Apparatus and method for block cipher process for insecure environments |
CN102404109A (zh) * | 2010-09-08 | 2012-04-04 | 鸿富锦精密工业(深圳)有限公司 | 密钥保护系统及方法 |
US9331852B2 (en) * | 2011-04-07 | 2016-05-03 | Infosys Technologies, Ltd. | System and method for securing data transaction |
US8538939B2 (en) | 2011-05-31 | 2013-09-17 | International Business Machines Corporation | Parsing optional block data |
US20120311324A1 (en) * | 2011-05-31 | 2012-12-06 | International Business Machines Corporation | Method of mapping key information |
US20120307998A1 (en) * | 2011-05-31 | 2012-12-06 | International Business Machines Corporation | Building optional blocks |
GB2491896A (en) * | 2011-06-17 | 2012-12-19 | Univ Bruxelles | Secret key generation |
US9281941B2 (en) * | 2012-02-17 | 2016-03-08 | International Business Machines Corporation | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management |
TWI502947B (zh) * | 2012-04-12 | 2015-10-01 | Jintai Ding | New cryptographic system and method based on mismatching |
US9197422B2 (en) * | 2013-01-24 | 2015-11-24 | Raytheon Company | System and method for differential encryption |
KR101657243B1 (ko) * | 2014-09-30 | 2016-09-30 | 남기원 | 온라인 시크릿 데이터 관리시스템 및 그 방법 |
US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
WO2017006630A1 (ja) * | 2015-07-07 | 2017-01-12 | ソニー株式会社 | 情報処理装置、情報処理方法、プログラム、情報処理システム、および通信装置 |
US10237061B2 (en) | 2015-09-25 | 2019-03-19 | International Business Machines Corporation | Generating master and wrapper keys for connected devices in a key generation scheme |
CN107615273A (zh) * | 2015-12-04 | 2018-01-19 | 慧与发展有限责任合伙企业 | 组合数据块的散列 |
Family Cites Families (66)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4316055A (en) | 1976-12-30 | 1982-02-16 | International Business Machines Corporation | Stream/block cipher crytographic system |
US4310720A (en) * | 1978-03-31 | 1982-01-12 | Pitney Bowes Inc. | Computer accessing system |
US4841570A (en) * | 1987-05-11 | 1989-06-20 | The United States Of America As Represented By The United States Department Of Energy | One-way transformation of information |
JPS6410750A (en) | 1987-07-02 | 1989-01-13 | Mitsubishi Electric Corp | Block encipherment device |
JPH0227389A (ja) | 1988-07-15 | 1990-01-30 | Sony Corp | 暗号化方法及び該暗号方法を用いた暗号化装置/復号化装置 |
US4964164A (en) | 1989-08-07 | 1990-10-16 | Algorithmic Research, Ltd. | RSA computation method for efficient batch processing |
US5003596A (en) * | 1989-08-17 | 1991-03-26 | Cryptech, Inc. | Method of cryptographically transforming electronic digital data from one form to another |
US5123045A (en) * | 1989-08-18 | 1992-06-16 | Massachusetts Institute Of Technology | Comprehensive software protection system |
JP2862141B2 (ja) | 1989-12-29 | 1999-02-24 | 富士通株式会社 | 慣用暗号を用いた識別番号ベース鍵管理装置 |
RU2091983C1 (ru) | 1993-02-09 | 1997-09-27 | Геннадий Николаевич Чижухин | Способ шифрования двоичной информации и устройство для его осуществления |
NZ336413A (en) * | 1993-12-01 | 2000-01-28 | Rpk Nz Ltd | Method of generating random numbers by manipulating electronic pointer with coordinates at points corresponding to time instants being used for selection of points subset and computation of number function |
US5481613A (en) * | 1994-04-15 | 1996-01-02 | Northern Telecom Limited | Computer network cryptographic key distribution system |
CA2149067A1 (en) | 1994-06-22 | 1995-12-23 | Joseph Anton Bednar Jr. | User-identification and verification of data integrity in a wireless communication system |
US5955624A (en) * | 1994-08-03 | 1999-09-21 | Cell Therapeutics, Inc. | Growth stimulating factors |
US6125182A (en) * | 1994-11-09 | 2000-09-26 | Channel One Communications, Inc. | Cryptographic engine using logic and base conversions |
EP0768774A3 (en) * | 1995-10-16 | 1999-08-04 | Sony Corporation | Method and apparatus for data encryption using a key generation hierarchy |
US5699431A (en) * | 1995-11-13 | 1997-12-16 | Northern Telecom Limited | Method for efficient management of certificate revocation lists and update information |
US5608801A (en) * | 1995-11-16 | 1997-03-04 | Bell Communications Research, Inc. | Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random functions |
JPH09149025A (ja) | 1995-11-24 | 1997-06-06 | Sezon Joho Syst:Kk | 暗号通信方法及び暗号通信システム |
US5838794A (en) * | 1996-01-11 | 1998-11-17 | Teledyne Electronic Technologies | Method and apparatus for inter-round mixing in iterated block substitution systems |
US5949884A (en) * | 1996-11-07 | 1999-09-07 | Entrust Technologies, Ltd. | Design principles of the shade cipher |
JPH10171350A (ja) | 1996-12-10 | 1998-06-26 | Hitachi Ltd | ハッシュ値生成方法および装置 |
US6226629B1 (en) * | 1997-02-28 | 2001-05-01 | Compaq Computer Corporation | Method and apparatus determining and using hash functions and hash values |
US5995624A (en) * | 1997-03-10 | 1999-11-30 | The Pacid Group | Bilateral authentication and information encryption token system and method |
WO1998047259A2 (en) * | 1997-03-10 | 1998-10-22 | Fielder Guy L | File encryption method and system |
JP2002508892A (ja) | 1997-03-10 | 2002-03-19 | ガイ・エル・フィールダー | 双方向認証および暗号化システム |
CA2293684A1 (en) | 1997-03-10 | 1998-10-15 | Paul N. Alito | Secure deterministic encryption key generator system and method |
JPH10271104A (ja) | 1997-03-24 | 1998-10-09 | Hitachi Inf Syst Ltd | 暗号化方法及び復号化方法 |
CA2302784A1 (en) * | 1997-09-17 | 1999-03-25 | Frank C. Luyster | Improved block cipher method |
US6012160A (en) * | 1997-10-03 | 2000-01-04 | Ericsson Inc. | Method for protecting important data bits using less important data bits |
JPH11122240A (ja) * | 1997-10-17 | 1999-04-30 | Fuji Xerox Co Ltd | 復号装置および方法ならびにアクセス資格認証装置および方法 |
US5935200A (en) | 1997-11-21 | 1999-08-10 | Unisys Corporation | Exponential functional relationship generator method and system for implementation in digital logic |
RU2141729C1 (ru) | 1998-01-19 | 1999-11-20 | Государственное унитарное предприятие Специализированный центр программных систем "Спектр" | Способ криптографического преобразования блоков двоичных данных |
US6304890B1 (en) * | 1998-02-04 | 2001-10-16 | Matsushita Electric Industrial Co., Ltd. | Exponential calculation device and decoding device |
US6567914B1 (en) * | 1998-07-22 | 2003-05-20 | Entrust Technologies Limited | Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system |
CA2282051A1 (en) | 1998-10-20 | 2000-04-20 | Lucent Technologies, Inc. | Efficient block cipher method |
JP3679936B2 (ja) | 1998-11-27 | 2005-08-03 | 東芝ソリューション株式会社 | 暗復号装置及び記憶媒体 |
CN1109423C (zh) | 1999-02-10 | 2003-05-21 | 河北工业大学 | 排列码加密解密方法及其排列码加密解密器 |
TW424371B (en) | 1999-02-26 | 2001-03-01 | Qic Systems Corp | Group signature method for group message transmission in unsafe communication channel |
US7743412B1 (en) | 1999-02-26 | 2010-06-22 | Intel Corporation | Computer system identification |
US6609223B1 (en) * | 1999-04-06 | 2003-08-19 | Kencast, Inc. | Method for packet-level fec encoding, in which on a source packet-by-source packet basis, the error correction contributions of a source packet to a plurality of wildcard packets are computed, and the source packet is transmitted thereafter |
US6735313B1 (en) | 1999-05-07 | 2004-05-11 | Lucent Technologies Inc. | Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers |
TW427087B (en) | 1999-05-14 | 2001-03-21 | Qic Systems Corp | Full domain key recovering system |
DE69939254D1 (de) | 1999-06-22 | 2008-09-18 | Hitachi Ltd | Kryptografisches Gerät und Verfahren |
TW556111B (en) * | 1999-08-31 | 2003-10-01 | Toshiba Corp | Extended key generator, encryption/decryption unit, extended key generation method, and storage medium |
AU2610701A (en) * | 2000-01-03 | 2001-07-16 | Efeckta Technologies Corporation | Efficient and lossless conversion for transmission or storage of data |
US20010031050A1 (en) * | 2000-02-14 | 2001-10-18 | Lateca Computer Inc. N.V. | Key generator |
WO2001082524A1 (en) | 2000-04-20 | 2001-11-01 | Matchett Noel D | Cryptographic system for data encryption standard |
WO2001089098A2 (en) * | 2000-05-05 | 2001-11-22 | Lee Ruby B | A method and system for performing permutations with bit permutation instructions |
AU2001269086A1 (en) * | 2000-07-04 | 2002-01-14 | Koninklijke Philips Electronics N.V. | Substitution-box for symmetric-key ciphers |
JP2002185443A (ja) | 2000-12-11 | 2002-06-28 | Hitachi Ltd | 秘密鍵管理方法 |
US20030037237A1 (en) | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
ATE389987T1 (de) * | 2001-05-03 | 2008-04-15 | Ericsson Telefon Ab L M | Verfahren und vorrichtung zum schutz der datenintegrität |
EP1425874B1 (en) * | 2001-08-13 | 2010-04-21 | Board Of Trustees Of The Leland Stanford Junior University | Systems and methods for identity-based encryption and related cryptographic techniques |
JP2003143120A (ja) | 2001-11-07 | 2003-05-16 | Matsushita Electric Ind Co Ltd | データ攪拌回路とデータ攪拌方法 |
JP2003187190A (ja) * | 2001-12-19 | 2003-07-04 | Hitachi Ltd | Icカード管理システム |
US7236592B2 (en) * | 2002-02-01 | 2007-06-26 | International Business Machines Corporation | Efficient stream cipher system and method |
US7464265B2 (en) * | 2002-05-03 | 2008-12-09 | Microsoft Corporation | Methods for iteratively deriving security keys for communications sessions |
JP2004072184A (ja) | 2002-08-01 | 2004-03-04 | Nippon Hoso Kyokai <Nhk> | データ改竄防止装置およびそのプログラム |
US7222363B2 (en) * | 2002-10-18 | 2007-05-22 | American Express Travel Related Services Company, Inc. | Device independent authentication system and method |
US7131003B2 (en) * | 2003-02-20 | 2006-10-31 | America Online, Inc. | Secure instant messaging system |
KR20040068499A (ko) * | 2003-01-24 | 2004-07-31 | 마쯔시다덴기산교 가부시키가이샤 | 공유키 교환방법과 통신기기 |
JP2005004048A (ja) * | 2003-06-13 | 2005-01-06 | Oki Electric Ind Co Ltd | 鍵拡張装置、鍵拡張方法および鍵拡張プログラム |
US7321659B2 (en) * | 2003-10-01 | 2008-01-22 | International Business Machines Corporation | Simple universal hash for plaintext aware encryption |
US20050147244A1 (en) * | 2003-12-30 | 2005-07-07 | Alexander Moldovyan | Method for cryptographic transformation of binary data blocks |
US7447233B2 (en) * | 2004-09-29 | 2008-11-04 | Intel Corporation | Packet aggregation protocol for advanced switching |
-
2004
- 2004-08-12 US US10/918,718 patent/US7577250B2/en not_active Expired - Fee Related
-
2005
- 2005-08-10 TW TW094127150A patent/TWI406549B/zh not_active IP Right Cessation
-
2009
- 2009-06-25 US US12/492,060 patent/US8155310B2/en not_active Expired - Fee Related
-
2012
- 2012-03-02 US US13/410,807 patent/US8737608B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
TWI406549B (zh) | 2013-08-21 |
US20120163591A1 (en) | 2012-06-28 |
US7577250B2 (en) | 2009-08-18 |
US20060034457A1 (en) | 2006-02-16 |
US8737608B2 (en) | 2014-05-27 |
US8155310B2 (en) | 2012-04-10 |
US20090262943A1 (en) | 2009-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TW200610349A (en) | Key derivation functions to enhance security | |
TNSN07055A1 (en) | Permutation data transform to enhance security | |
WO2006023334A3 (en) | Permutation data transform to enhance security | |
WO2009134937A3 (en) | Format-preserving cryptographic systems | |
TW200723818A (en) | Method and system for deriving an encryption key using joint randomness not shared by others | |
AU2017269734A1 (en) | Cryptologic rewritable blockchain | |
NZ734791A (en) | Access control for encrypted data in machine-readable identifiers | |
MY146687A (en) | Cryptographic key generation | |
TW200618572A (en) | Tokens/keys for wireless communications | |
WO2008049046A3 (en) | Method for securely extending key stream to encrypt high-entropy data | |
MX336828B (es) | Dispositivo para compartir clave y sistemas para configuracion del mismo. | |
WO2017106705A3 (en) | Secure vehicle communication system | |
WO2004102918A3 (en) | Key agreement and transport protocol | |
WO2009002599A3 (en) | Electronically securing an electronic device using physically unclonable functions | |
TW200611533A (en) | Exponential data transform to enhance security | |
WO2015023332A3 (en) | Incorruptible public key using quantum cryptography for secure wired and wireless communications | |
MY163449A (en) | Conversation rights management | |
WO2014116956A3 (en) | System and method for differential encryption | |
EP1905186A4 (en) | CRYPTOGRAPHIC AUTHENTICATION AND / OR DETERMINATION OF A COMMON CRYPTOGRAPHIC KEY USING A SIGNATING KEY ENCLOSED WITH NON-ONE-TIME PAD ENCRYPTION, INCLUDING (BUT NOT LIMITED TO) PROCEDURES WITH INCREASED SAFETY AGAINST MALLEABILITY ATTACKS | |
WO2008086241A3 (en) | A method of two strings private key (symmetric) encryption and decryption algorithm | |
WO2010141445A3 (en) | Workgroup key wrapping for community of interest membership authentication | |
WO2010040629A3 (de) | Datenverarbeitungssystem zur bereitstellung von berechtigungsschlüsseln | |
EP2442483A3 (en) | Elliptic curve Pinstov Vanstone signature scheme with authenticated message recovery | |
WO2011033259A3 (en) | Key generation for multi-party encryption | |
MX340269B (es) | Determinacion de codigos criptograficos. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |